AWord-Based Genetic Algorithm for Cryptanalysis of Short Cryptograms

Size: px
Start display at page:

Download "AWord-Based Genetic Algorithm for Cryptanalysis of Short Cryptograms"

Transcription

1 AWord-Based Genetic Algorithm for Cryptanalysis of Short Cryptograms Ralph Morelli and Ralph Walde Computer Science Department Trinity College Hartford, CT Abstract This paper demonstrates the feasibility of a word-based genetic algorithm (GA) for solving short substitution cryptograms such as the kind found in newspapers and puzzle books. Although GA s based on analysis of letter, digram, or trigram frequencies have been used on substitution cryptograms, they are not able to solve short (10-30 word) cryptograms of the sort we address. By using a relatively small dictionary of frequent words to initialize a set of substitution keys, and by employing a word-based crossing mechanism, the GA achieves performance that is comparable to deterministic word-based algorithms. Introduction This paper describes a word-based genetic algorithm for solving simple substitution cryptograms such as the kind found in newspapers and in puzzle books. These are relatively short (10-30 word) cryptograms with word boundaries and punctuation. The ciphertext is created by choosing a permutation of the 26-character alphabet and using it to replace each letter in the plaintext message: Cryptogram: pkji oexn agnxn x gh tjxit oj nejr vjp ejr g apide jy amxteo vjpit yjfcn sxs yxis g deghkxji; g hgi rxoe ajvn gis txmfn jy exn jri. A solution to this cryptogram must successfully choose the correct permutation from among 26! (around ) possible permutations. In the solution shown here, the GA found all words except bunch and champion: Plaintext : upon this basis i am going to show you how a bunxh ofbright young folks did find a xhampion; a man with boys and girls of his own. Most approaches for automatic cryptanalysis of simple substitution ciphers are based on frequency analyses (see (8), (5), (6), (7), (9), (4)). These approaches are quite effective achieving nearly 100 percent accuracy provided that the ciphertext is long enough and contains a fairly normal distribution of the English letters. Most frequency-based approaches require between 400 to 1000 characters of ciphertext to be effective. However, since most puzzle cryptograms are very short, frequency-based algorithms cannot Copyright c 2003, American Association for Artificial Intelligence ( All rights reserved. be used successfully in their solution. Note, for example, that the above cryptogram contains only 132 characters (including spaces) and has no occurrences of the letter e, the most frequent English letter. A successful approach for solving short cryptograms was developed by Hart (2). This approach is based on word frequencies rather than letter frequencies. What s surprising about the word-based approach is that one can perform a successful analysis with a relatively small dictionary. As Hart points out, although there are over 100,000 words in English, a randomly selected word from an English text has more than a 50 percent chance of occurring in a dictionary consisting of the 135 most frequent words (2). Hart s algorithm uses a deterministic depth-first search through a tree of word assignments, where each ciphertext token is paired with a set of possible matching words from the dictionary. As the search moves down the tree, a partial substitution key is constructed. The tree is pruned whenever a new token-word pair would be incompatible with the partial key. Hart is able to decode cryptograms containing as few as 10 words with acceptable speed. The speed and overall success of Hart s algorithm varies with the size of the dictionary. The larger the dictionary, the more words the algorithm can find, although its speed will diminish dramatically. If the message contains words not in the dictionary, a complete solution may not be found. Building on some of Hart s ideas, this paper demonstrates the feasibility of a word-based GA for solving short cryptograms. Related Work Most algorithms for cryptanalyzing substitution ciphers are based on frequency analysis. Peleg and Rosenfeld and King and Bahler use a probabilistic relaxation algorithm to solve simple substitution ciphers (8), (5). This is a classification algorithm in which letters of the ciphertext are matched with certain plaintext letters by analyzing the letter, digram or trigram frequencies in the ciphertext. These algorithms are very effective, provided that the ciphertext contains enough characters. In Peleg and Rosenfeld s study, which used texts containing around 1000 characters, they were able to find the correct key within 15 iterations. Using a similar approach, King and Bahler found their algorithm was effective for texts of 400 characters or longer. Their algorithm converged to FLAIRS

2 the correct solution after only 2 or 3 iterations. King has extended this approach with success to polyalphabetic substitution ciphers, achieving 100 percent success for texts with at least 800 characters (5). A similar approach that incorporated various speed-up techniques, with comparable results, was described by Jacobsen (4). Genetic algorithms for analyzing substitution ciphers have also been based on frequency analysis. Spillman et al. used both single character frequencies and digram frequencies to calculate the fitness of their population (9). Matthews used a genetic algorithm based on frequency analysis to analyze transposition ciphers, with similarly good results (7). Genetic Algorithms The basic idea behind genetic algorithms is to model the natural selection process, in which members are selected from the population and mated to each other to create a new generation of individuals (3), (1). The process begins by creating a random initial generation of individuals, sometimes called chromosomes, that in some way represent the problem being solved. Pairs of members of the current population are selected and mated with each other by means of a crossover operation to produce members for the succeeding generation. Randomly selected members of the current generation also undergo mutation,in which random portions of genetic material are exchanged. The fittest members of each generation, as determined by a fitness function are then selected for the succeeding generation (Figure 1). The crossover and mutation operations are controlled by the crossover rate and mutation rate parameters, which determine the proportion of the population that undergoes these changes. Figure 1: The basic genetic algorithm. In a GA for breaking a substitution cryptogram, the mating and mutation processes are used to generate a search through the cryptogram s key space. The search is guided in a nondeterministic way by the fitness function, which measures how well a given key succeeds in decrypting the message. In our algorithm, the more words found in the evaluation dictionary, the higher the fitness value. Using the GA to Break Short Cryptograms The purpose of this study was to determine how well a wordbased GA could solve short cryptograms. What attracted us to the word-based approach is that it works well on short cryptograms and it is closer to the way a human solves such cryptograms. In this section we describe the main features of our algorithm. Representation of the Key In our GA, the chromosomes correspond to the substitution keys, with each chromosome representing a different key. Akey is represented as a permutation of the 26 letters of the alphabet, arranged in an ordered sequence, with the first letter representing the letter that would be substituted for A, the second for B, and so on. For example, in the following permutation, SUQHCLADFGJKNOPTVWXZBEMRIY the letter S would be substituted in the cryptogram for plaintext A, U for B, and so on. For example, the word CAB would be encrypted as QSU. Our GA uses a pattern dictionary to construct a collection of token-word pairs in which every token in the cryptogram is paired with all dictionary words having the same pattern. The token-word pairs are then used to seed the chromosomes. For example, suppose the first word in the cryptogram is bzdyd. This matches dictionary words these, there, and where. Therefore one of the chromosomes would be based on the pair bzdyd=these,withb substituted for t, z for h, and so on. Each chromosome is thus seeded with one or more randomly selected token-word pairs. The pattern dictionary is constructed from the machinereadable Kucera-Francis word list of the N most frequent words (10). We ve experimented with dictionaries as small as 50 words and as large as In the current implementation we use a dictionary of 50 words to seed the keys and a dictionary of 3500 words to evaluate the keys. Fitness Function The function used to determine the fitness of a chromosome is based on applying the key to the cryptogram and then counting the number of dictionary words produced. The more words produced, the better the key: Calculate the fitness of this chromosome: 1. Use the key to decrypt the message. 2. Fitness = the number of distinct words in the decrypted message that are in the fitness dictionary. 3. Return fitness. Even though it is somewhat coarse-grained for a cryptogram containing 10 tokens the possible scores would range from 0 to 10 this simple metric works surprisingly well. Mating and Mutation Processes The mating process crosses two parent chromosomes to produce two children, where each child contains genetic material (letters from the key) from both parents. For each pair of parents, whether a cross takes place depends on the crossover parameter. If set to 0.9, approximately 90% of possible crosses will be performed in each generation. In the current model, children compete with their parents for 230 FLAIRS 2003

3 survival into the next generation, for which the fittest individuals are selected. The crossover mechanism itself works as follows: For each parent, p1 and p2 1. Collect those letters that are used in words found in the fitness dictionary. 2. Exchange those letters with the corresponding letters in the other parent s key to produce the child s key. For example, suppose we have the following pairs of chromosomes. Alpha: Parent1: Parent2: ABCDEFGHIJKLMNOPQRSTUVWXYZ SUQHCLADFGJKNOPTVWXZBEMRIY AZBYXCWDEVUFGTSHRIQJPKLOMN Suppose that parent1 s key is able to find only the word AND and that parent2 s key is able to find only the word BIG. The word AND corresponds to SOH in parent1 and ATY in parent2. The word BIG corresponds to UFA in parent1 and ZEW in parent2. If we use parent1 s key to initialize child1 (c1) and parent2 s key to initialize child2 (c2), then the following swaps would be performed:. swap(s,a) in c2 swap(o,t) in c2 swap(h,y) in c2 swap(u,z) in c1 swap(f,e) in c1 swap(a,w) in c1 It should be obvious that this mechanism preserves the validity of each key because each key is still a permutation of the 26 letters of the alphabet. Alpha: Child1: Child2: ABCDEFGHIJKLMNOPQRSTUVWXYZ SZQHCLWDEGJKNOPTVAXUBFMRIY SZBHXCWDEVUFGOAYRIQJPKLTMN Assuming that before the cross parent1 found only AND and parent2 found only BIG, then both children benefit from the swap because they both now find AND and BIG. This can be seen by noting that both keys have the same letters associated with AND (SOH) and BIG (ZEW). As a result of this cross, the children s score would increase from 1 to 2. The children would replace the parents in the population. Note that this mechanism is not guaranteed to improve the children. Suppose in the preceding example that both parents were able to find other words beside AND and BIG. In that case while it is true that both children will decrypt AND and BIG the changes might have messed up other words. For example, suppose some of the letters in SOH were used by child2 to find the word ART. Then by swapping SOH with other letters, child2 is no longer be able to find ART. In that case its score might actually decrease. On the other hand, blocking child2 from finding ART might make it possible for it to find RANT and NOT, thereby increasing its score. However, even though it can produce children with lower scores, our experiments have revealed that this mechanism improves the fitness of the children roughly 3 times as often as it reduces their fitness. (Experimentally, a majority of crosses result in no change in the fitness.) By using an occurs check it would be a simple matter to modify the crossing algorithm to guarantee that crosses never decrease the child s score. In the preceding example, because swapping SOH would drop ART from child2 the occurs check would prevent that from happening. This would guarantee that child2 could not be worse than its parent. However, in our experiments use of the occurs check did not improve the overall performance of the GA. It appears to make it more likely that the algorithm gets stuck at a local maximum rather than finding the true key. The fact that a certain percentage of keys have (erroneous) words dropped from found lists seems to act like a random perturbation that jolts the GA out of that kind of rut. The final element of the GA is the mutation process. This process is controlled by the mutation rate, aparameter that determines the proportion of individuals in each generation that undergo mutation. In our experiments the mutation rate has been varied between 0.1 and 1.0. The mutation mechanism is simply to swap two characters chosen at random in the key. In the current model, mutated individuals competes with the rest of the population to survive into the next generation. This mechanism seems to play a role in the GA s ability to escape from local maxima. Results The algorithm described in the preceding sections is controlled by a number of parameters. We ve already mentioned the crossover rate, mutation rate, and occurs check. Other parameters that we ve varied are population size, the number of individuals in the population, and dictionary size, the number of frequent words used to construct the pattern dictionary. We ve run many experiments during development and testing of the GA. Since we are mainly interested in the overall feasibility of the GA approach to this problem, the results we describe here use the settings given in Table 1. Parameter Setting Population Size 512 individuals Seeding Dictionary Size 50 words Fitness Dictionary Size 3500 words Crossover Rate 0.9 Mutation Rate 0.2 Occurs Check Off Table 1: Parameter settings for GA Cryptanalyzer. We ve tested the GA on a variety of plaintext messages, ranging from extremely short messages ( to be or not to be that is the question ), to messages missing the letter E ( upon this basis i am going to show you how a... ), from messages whose words are all contained in the fitness dictionary to messages with 1/4 or 1/2 of their words missing from the dictionary. (Note that because the keys are initially assigned random permutation of the alphabets, the plaintext messages are no easier for the GA to solve than encrypted messages.) Table 2 summarizes the results we achieved for a representative sample of these messages. For each message we show the number of distinct tokens (ntoks) it contains, the number of its tokens that decrypt to words in the evaluation dictionary (nwds), the average number of words found FLAIRS

4 per trial (nfound), the average number of generations (maximum 500) required to find all the words (ngens), and the number of trial runs (ntrials). msg ntoks nwds nfound ngens ntrials Table 2: Performance results for five plaintext messages. Message 1 is the phrase to be or not that is the question. Message 2 is the message shown in the introduction, which is taken from Ernest Wright s novel Gadsby, a267- page novel with no occurrences of the letter E. Message 5 is an example of a typical published cryptogram, which are frequently chosen to be difficult to solve. This message contains only 12 dictionary words out of 21 tokens: I shoot the hippopotamous with bullets made of platinum because if I use leaden ones his hide is sure to flatten em. Messages 1, 2, and 5 were also used in Hart s study (2). Message 3 is a combination of the quick brown fox jumped over the lazy dog and now is the time for all good men to come to the aid of their country. What s interesting about this message is the singleton occurrences of the infrequent letters X, Z, Q, and K. Message 4 is a passage, picked more or less at random from the Dorothy Sayers novel Have His Carcase. For this study we let the algorithm run for 500 generations or until the top 3 individuals had all achieved scores equal to nwds. This is the best score that the algorithm can achieve given its current scoring dictionary. And this is our criterion for success. The fact that the GA cannot always find all the words unless an extremely large dictionary is used is a tradeoff that we discuss below. However, even for message 5, which contained only 12 words out of 21 tokens, the algorithm usually finds enough correct letter mappings to make the rest of the cryptogram solvable by visual examination. This set of results shows that the algorithm is both highly successful at finding the key and highly efficient. Out of the trials compiled here, the algorithm achieved complete success defined as finding all the words that could be found in 94 out of 105 trials, a 90% success rate. The average number of generations required for all 105 trials was 94. But this average is somewhat misleading. It is skewed by the 15% of the times that the algorithm got stuck at a local maximum. In the 105 trials, there were 15 trials which ran over 250 generations. In 69 out of 105 trials (66%), the algorithm converged on the solution in fewer than 35 generations. One of the challenges of further research in this area would be to determine if the algorithm s occasional propensity to get in a rut is something that can be addressed by design or parametric changes or is due purely to chance. To test the relative contributions of mutation and crossover in our algorithm we ran it on the original set of messages with the mutation rate set to 1.0 and the crossover rate set to 0. The algorithm repeatedly failed to converge to a solution. This shows that both mechanisms crossover and mutation play a significant role in the algorithm s success. This is not to downplay the significant role played by mutation in our algorithm. Indeed, in further trials we found that the algorithm converged quickest with a mutation rate of 1.0. This means that mutation the swapping of two random characters in the key is performed on every individual. One possible explanation for this result is that our crossover mechanism tends to preserve those portions of the key that are associated with the words found by that key. With a low mutation rate, a key that has found the wrong words is more likely to get stuck in a rut. Alternatively, with a high mutation rate those portions of the key that code for the wrong words are more likely to get broken up. In any case, the relative contributions made by our crossover and mutation mechanisms is a question that we need to address in future studies. We also tested the algorithm with a very large (100,000+ word) evaluation dictionary. In these trials the algorithm invariably performed worse than with the 3500-word evaluation dictionary. Our explanation for this somewhat surprising result is that using a large dictionary disproportionately rewards keys containing wrong words. Obviously, this too is an area for further study. Finally, we have tested the algorithm on seven actual cryptograms, all of which were published by Eliot Sperber in different editions of the Sunday Hartford Courant. For these trials the only change in parameter settings from Table 1 is that the mutation rate was set to 1.0. These results are summarized in Table 3. For each message we show the number of distinct tokens it contains (ntoks), the number of its tokens that decrypt to words in the the evaluation dictionary (nwds), the percentage of tokens that were correctly identified (%Found), the average number of generations (maximum 100) required to solve the message (ngens), and the number of trial runs (ntrials). msg ntoks nwds %Found ngens ntrials Table 3: Performance results for seven cryptograms. As in our earlier experiments, these results show that the algorithm is efficient and successful at finding the key. Out of 350 runs, the algorithm terminated with a solution 338 times (96.6%). In 121 cases (34.6%) the algorithm got the cryptogram 100% correct that is, it decrypted every token correctly. In 192 cases (54.8%), it got at least 90% of the tokens correct. And in 236 cases (67.4%), it got at least 75% of the tokens correct. Messages in which 75% of the tokens were correct could usually be read directly. Messages with 232 FLAIRS 2003

5 fewer correct tokens could often be solved with additional visual analysis. Of course, for several of these messages (numbers 2, 3, 4, 5, and 7), fewer than 66% of the tokens were contained in the evaluation dictionary. These results also show that the algorithm s performance varies considerably depending on the message itself. For example, note that for messages 2 and 5, the algorithm was highly successful even though only around two thirds of the tokens in those messages were dictionary words. On the other hand, the algorithm was less successful on message 6, in which more than 90% of its tokens were words. In our view, more analysis of these results is needed. Discussion There are several conclusions that can be drawn from this study. The overall conclusion is that the word-based GA compares favorably with results that have been reported in the literature for both deterministic keys searches, such as depth-first search (2), and with frequency-based GAs (9). The following specific points are also worth noting. Our results indicate that a word-based genetic algorithm can be highly successful at breaking short cryptograms. In the great majority of our trials the GA found the key in relatively few generations using an evaluation dictionary of only 3500 words. Although the GA s success rate is clearly dependent on the size of the dictionary, because of the algorithm s nondeterministic nature, its efficiency is not degraded as much as a deterministic search when the dictionary size is increased. However, its success rate does not appear to improve dramatically when a very large evaluation dictionary is used. Compared to frequency-based algorithms reported in the literature, which require at least 400 characters to be effective, the word-based GA is highly successful at solving short cryptograms and cryptograms with unusual character distributions. The main weaknesses of this approach appears to be its sensitivity to dictionary size and its heavy dependence on randomness, as indicated by its good performance with a high mutation rate. However, to some degree these are inherent tradeoffs that do not affect practical problem solving. If the GA fails on a given message on one trial, it is likely to succeed on the next. Can the GA s success with substitution ciphers be extended to other kinds of ciphers such as polyalphabetic and transposition ciphers or to other applications? Acknowledgements The authors would like to thank the FLAIRS reviewers. We have run additional experiments and have incorporated some of their suggestions in the paper. References 1. D. Goldberg. Genetic Algorithms in Search, Optimization, and Machine Learning. Reading, MA: Addison- Wesley G. Hart. To decode short cryptograms. CACM, 37(9), pp , J.H. Holland. Adaptation in Natural and Artificial Systems. Ann Arbor, MI: University of Michigan Press T. Jacobsen. A fast method for cryptanalysis of substitution ciphers. Cryptologia, 19(3), J.C. King and D.R. Bahler. An implementation of probabilistic relaxation in the cryptanalysis of simple substitution ciphers. Cryptologia, 16(3), pp , J.C. King. An algorithm for the complete automated cryptanalysis of periodic polyalphabetic substitution ciphers. Cryptologia, 18(4), pp , R.A.J. Matthews. The use of genetic algorithms in cryptanalysis. Cryptologia, 17(2), pp , S. Peleg and A. Rosenfeld. Breaking substitution ciphers using a relaxation algorithm. CACM 22(11), pp , R. Spillman, M. Janssen, B. Nelson and M. Kepner. Use of a genetic algorithm in the cryptanalysis of simple substitution ciphers Cryptologia, 17(1), pp , MRC Psycholinguistic Database, University of Western Australia, http : // mrc.htm. Plans for the Future The results presented in this paper address only the overall effectiveness of a word-based GA approach to solving short cryptograms. There are a number of issues that we have not yet examined that could be the focus for additional research. Is there any way to rescue the algorithm when its gets stuck? The current system tweaks the algorithm by replacing the population with new individuals. What is the relationship between words in the message and the dictionary size? Why does the algorithm succeed so easily with some messages and not others with a comparable word-to-token ratio? FLAIRS

Attacking of Stream Cipher Systems Using a Genetic Algorithm

Attacking of Stream Cipher Systems Using a Genetic Algorithm Attacking of Stream Cipher Systems Using a Genetic Algorithm Hameed A. Younis (1) Wasan S. Awad (2) Ali A. Abd (3) (1) Department of Computer Science/ College of Science/ University of Basrah (2) Department

More information

A Dominant Gene Genetic Algorithm for a Substitution Cipher in Cryptography

A Dominant Gene Genetic Algorithm for a Substitution Cipher in Cryptography A Dominant Gene Genetic Algorithm for a Substitution Cipher in Cryptography Derrick Erickson and Michael Hausman University of Colorado at Colorado Springs CS 591 Substitution Cipher 1. Remove all but

More information

Cardano Girolamo Cardano invented: Fleissner, after Austrian cryptologist (Eduard). Described by Jules Verne in the story Mathias Sandorf.

Cardano Girolamo Cardano invented: Fleissner, after Austrian cryptologist (Eduard). Described by Jules Verne in the story Mathias Sandorf. Rotating Grille Cardano Girolamo Cardano invented: Fleissner, after Austrian cryptologist (Eduard). Described by Jules Verne in the story Mathias Sandorf. An even number of cells on each side of grille

More information

STA4000 Report Decrypting Classical Cipher Text Using Markov Chain Monte Carlo

STA4000 Report Decrypting Classical Cipher Text Using Markov Chain Monte Carlo STA4000 Report Decrypting Classical Cipher Text Using Markov Chain Monte Carlo Jian Chen Supervisor: Professor Jeffrey S. Rosenthal May 12, 2010 Abstract In this paper, we present the use of Markov Chain

More information

PART FOUR. Polyalphabetic Substitution Systems PERIODIC POLYALPHABETIC SUBSTITUTION SYSTEMS

PART FOUR. Polyalphabetic Substitution Systems PERIODIC POLYALPHABETIC SUBSTITUTION SYSTEMS PART FOUR Polyalphabetic Substitution Systems PERIODIC POLYALPHABETIC SUBSTITUTION SYSTEMS CHAPTER 8 Section I Characteristics of Periodic Systems 8-1. Types of Polyalphabetic Systems All the substitution

More information

THE MAJORITY of the time spent by automatic test

THE MAJORITY of the time spent by automatic test IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 17, NO. 3, MARCH 1998 239 Application of Genetically Engineered Finite-State- Machine Sequences to Sequential Circuit

More information

Sherlock Holmes and the adventures of the dancing men

Sherlock Holmes and the adventures of the dancing men Sherlock Holmes and the adventures of the dancing men Kseniya Garaschuk May 30, 2013 1 Overview Cryptography (from Greek for hidden, secret ) is the practice and study of hiding information. A cipher is

More information

DJ Darwin a genetic approach to creating beats

DJ Darwin a genetic approach to creating beats Assaf Nir DJ Darwin a genetic approach to creating beats Final project report, course 67842 'Introduction to Artificial Intelligence' Abstract In this document we present two applications that incorporate

More information

Appendix Cryptograms

Appendix Cryptograms Fall 2006 Chris Christensen MAT/CSC 483 Appendix Cryptograms Here is a more detailed discussion of the history and techniques for solution of aristocrats and patristocrats (the generic term for them is

More information

Soft Computing Approach To Automatic Test Pattern Generation For Sequential Vlsi Circuit

Soft Computing Approach To Automatic Test Pattern Generation For Sequential Vlsi Circuit Soft Computing Approach To Automatic Test Pattern Generation For Sequential Vlsi Circuit Monalisa Mohanty 1, S.N.Patanaik 2 1 Lecturer,DRIEMS,Cuttack, 2 Prof.,HOD,ENTC, DRIEMS,Cuttack 1 mohanty_monalisa@yahoo.co.in,

More information

USAGE OF FIREFLY ALGORITHM IN VIGNERE CIPHER TO REDUCE VARIABLE LENGTH KEY SEARCH TIME

USAGE OF FIREFLY ALGORITHM IN VIGNERE CIPHER TO REDUCE VARIABLE LENGTH KEY SEARCH TIME USAGE OF FIREFLY ALGORITHM IN VIGNERE CIPHER TO REDUCE VARIABLE LENGTH KEY SEARCH TIME 1 V.RAJENDRAN, 2 DR.T.PURUSOTHAMAN 1 Research Scholar, Anna university, Coimbatore, Tamilnadu, India. 2 Faculty Of

More information

WHAT MAKES FOR A HIT POP SONG? WHAT MAKES FOR A POP SONG?

WHAT MAKES FOR A HIT POP SONG? WHAT MAKES FOR A POP SONG? WHAT MAKES FOR A HIT POP SONG? WHAT MAKES FOR A POP SONG? NICHOLAS BORG AND GEORGE HOKKANEN Abstract. The possibility of a hit song prediction algorithm is both academically interesting and industry motivated.

More information

HCCA: A Cryptogram Analysis Algorithm Based on Hill Climbing

HCCA: A Cryptogram Analysis Algorithm Based on Hill Climbing International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2015) HCCA: A Cryptogram Analysis Algorithm Based on Hill Climbing Zhang Tongbo ztb5129@live.com Li Guangli calculatinggod@foxmail.com

More information

CS408 Cryptography & Internet Security

CS408 Cryptography & Internet Security CS408 Cryptography & Internet Security Lecture 4: Rotor Machines Enigma Reza Curtmola Department of Computer Science / NJIT How to move from pencil and paper to more automatic ways of encrypting and decrypting?

More information

Algorithmic Music Composition

Algorithmic Music Composition Algorithmic Music Composition MUS-15 Jan Dreier July 6, 2015 1 Introduction The goal of algorithmic music composition is to automate the process of creating music. One wants to create pleasant music without

More information

An Introduction to Cryptography

An Introduction to Cryptography An Introduction to http://www.southernct.edu/~fields/ Terminology is the study of secret writing. This is the only branch of mathematics to be designated by the U.S. government as export-controlled. Cryptographic

More information

Evolutionary Computation Applied to Melody Generation

Evolutionary Computation Applied to Melody Generation Evolutionary Computation Applied to Melody Generation Matt D. Johnson December 5, 2003 Abstract In recent years, the personal computer has become an integral component in the typesetting and management

More information

Enigma. Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany

Enigma. Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany Enigma Enigma 1 Enigma Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany o For both military and diplomatic use o Many variations used Broken

More information

FOR OFFICIAL USE ONLY

FOR OFFICIAL USE ONLY *FM 34-40-2 FIELD MANUAL NO 34-40-2 HEADQUARTERS DEPARTMENT OF THE ARMY Washington, DC, 13 September 1990 FOR OFFICIAL USE ONLY i ii iii PREFACE This field manual is intended as a training text in basic

More information

Fugue generation using genetic algorithms

Fugue generation using genetic algorithms Fugue generation using genetic algorithms Claudio Coutinho de Biasi, Alexandre Mattioli debiasi@centroin.com.br mattioli@rj.conectiva.com. br Resumo: Este artigo propõe um sistema capaz de gerar peças

More information

PA Substitution Cipher

PA Substitution Cipher Anuj Kumar 1 PA Substitution Cipher Ankur Kumar Varshney 2 Pankaj Kumar 3 1 M.Tech*, Computer Science & Engineering IEC CET, Greater Noida, (U.P.) India 2 M.Tech*, Computer Science & Engineering B.S.A

More information

Cryptography CS 555. Topic 5: Pseudorandomness and Stream Ciphers. CS555 Spring 2012/Topic 5 1

Cryptography CS 555. Topic 5: Pseudorandomness and Stream Ciphers. CS555 Spring 2012/Topic 5 1 Cryptography CS 555 Topic 5: Pseudorandomness and Stream Ciphers CS555 Spring 2012/Topic 5 1 Outline and Readings Outline Stream ciphers LFSR RC4 Pseudorandomness Readings: Katz and Lindell: 3.3, 3.4.1

More information

Sudhanshu Gautam *1, Sarita Soni 2. M-Tech Computer Science, BBAU Central University, Lucknow, Uttar Pradesh, India

Sudhanshu Gautam *1, Sarita Soni 2. M-Tech Computer Science, BBAU Central University, Lucknow, Uttar Pradesh, India International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2018 IJSRCSEIT Volume 3 Issue 3 ISSN : 2456-3307 Artificial Intelligence Techniques for Music Composition

More information

EVOLVING DESIGN LAYOUT CASES TO SATISFY FENG SHUI CONSTRAINTS

EVOLVING DESIGN LAYOUT CASES TO SATISFY FENG SHUI CONSTRAINTS EVOLVING DESIGN LAYOUT CASES TO SATISFY FENG SHUI CONSTRAINTS ANDRÉS GÓMEZ DE SILVA GARZA AND MARY LOU MAHER Key Centre of Design Computing Department of Architectural and Design Science University of

More information

Various Artificial Intelligence Techniques For Automated Melody Generation

Various Artificial Intelligence Techniques For Automated Melody Generation Various Artificial Intelligence Techniques For Automated Melody Generation Nikahat Kazi Computer Engineering Department, Thadomal Shahani Engineering College, Mumbai, India Shalini Bhatia Assistant Professor,

More information

A Comparison of Methods to Construct an Optimal Membership Function in a Fuzzy Database System

A Comparison of Methods to Construct an Optimal Membership Function in a Fuzzy Database System Virginia Commonwealth University VCU Scholars Compass Theses and Dissertations Graduate School 2006 A Comparison of Methods to Construct an Optimal Membership Function in a Fuzzy Database System Joanne

More information

Breaking the Enigma. Dmitri Gabbasov. June 2, 2015

Breaking the Enigma. Dmitri Gabbasov. June 2, 2015 Breaking the Enigma Dmitri Gabbasov June 2, 2015 1 Introduction Enigma was an electro-mechanical machine that was used before and during the World War II by Germany to encrypt and decrypt secret messages.

More information

Ciphers that Substitute Symbols

Ciphers that Substitute Symbols Fall 2006 Chris Christensen MAT/CSC 483 Ciphers that Substitute Symbols I Δ ℵ Ω Δ ℵ Some historical simple substitution ciphers substitute symbols for plaintext letters. The ciphertext then looks less

More information

An Evolutionary Approach to Case Adaptation

An Evolutionary Approach to Case Adaptation An Evolutionary Approach to Case Adaptation Andrés Gómez de Silva Garza and Mary Lou Maher Appears in: Case-Based Reasoning Research and Applications. Third International Conference on Case-Based Reasoning,

More information

How to Predict the Output of a Hardware Random Number Generator

How to Predict the Output of a Hardware Random Number Generator How to Predict the Output of a Hardware Random Number Generator Markus Dichtl Siemens AG, Corporate Technology Markus.Dichtl@siemens.com Abstract. A hardware random number generator was described at CHES

More information

Music Morph. Have you ever listened to the main theme of a movie? The main theme always has a

Music Morph. Have you ever listened to the main theme of a movie? The main theme always has a Nicholas Waggoner Chris McGilliard Physics 498 Physics of Music May 2, 2005 Music Morph Have you ever listened to the main theme of a movie? The main theme always has a number of parts. Often it contains

More information

Stream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher

Stream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher Lecturers: Mark D. Ryan and David Galindo. Cryptography 2015. Slide: 90 Stream Cipher Suppose you want to encrypt a stream of data, such as: the data from a keyboard the data from a sensor Block ciphers

More information

Skip Length and Inter-Starvation Distance as a Combined Metric to Assess the Quality of Transmitted Video

Skip Length and Inter-Starvation Distance as a Combined Metric to Assess the Quality of Transmitted Video Skip Length and Inter-Starvation Distance as a Combined Metric to Assess the Quality of Transmitted Video Mohamed Hassan, Taha Landolsi, Husameldin Mukhtar, and Tamer Shanableh College of Engineering American

More information

Automated Accompaniment

Automated Accompaniment Automated Tyler Seacrest University of Nebraska, Lincoln April 20, 2007 Artificial Intelligence Professor Surkan The problem as originally stated: The problem as originally stated: ˆ Proposed Input The

More information

DETERMINISTIC TEST PATTERN GENERATOR DESIGN WITH GENETIC ALGORITHM APPROACH

DETERMINISTIC TEST PATTERN GENERATOR DESIGN WITH GENETIC ALGORITHM APPROACH Journal of ELECTRICAL ENGINEERING, VOL. 58, NO. 3, 2007, 121 127 DETERMINISTIC TEST PATTERN GENERATOR DESIGN WITH GENETIC ALGORITHM APPROACH Gregor Papa Tomasz Garbolino Franc Novak Andrzej H lawiczka

More information

Conditional Probability and Bayes

Conditional Probability and Bayes Conditional Probability and Bayes Chapter 2 Lecture 7 Yiren Ding Shanghai Qibao Dwight High School March 15, 2016 Yiren Ding Conditional Probability and Bayes 1 / 20 Outline 1 Bayes Theorem 2 Application

More information

Time Domain Simulations

Time Domain Simulations Accuracy of the Computational Experiments Called Mike Steinberger Lead Architect Serial Channel Products SiSoft Time Domain Simulations Evaluation vs. Experimentation We re used to thinking of results

More information

Evolving Cellular Automata for Music Composition with Trainable Fitness Functions. Man Yat Lo

Evolving Cellular Automata for Music Composition with Trainable Fitness Functions. Man Yat Lo Evolving Cellular Automata for Music Composition with Trainable Fitness Functions Man Yat Lo A thesis submitted for the degree of Doctor of Philosophy School of Computer Science and Electronic Engineering

More information

SIMULATION OF PRODUCTION LINES THE IMPORTANCE OF BREAKDOWN STATISTICS AND THE EFFECT OF MACHINE POSITION

SIMULATION OF PRODUCTION LINES THE IMPORTANCE OF BREAKDOWN STATISTICS AND THE EFFECT OF MACHINE POSITION ISSN 1726-4529 Int j simul model 7 (2008) 4, 176-185 Short scientific paper SIMULATION OF PRODUCTION LINES THE IMPORTANCE OF BREAKDOWN STATISTICS AND THE EFFECT OF MACHINE POSITION Ilar, T. * ; Powell,

More information

Why t? TEACHER NOTES MATH NSPIRED. Math Objectives. Vocabulary. About the Lesson

Why t? TEACHER NOTES MATH NSPIRED. Math Objectives. Vocabulary. About the Lesson Math Objectives Students will recognize that when the population standard deviation is unknown, it must be estimated from the sample in order to calculate a standardized test statistic. Students will recognize

More information

Evolving Musical Scores Using the Genetic Algorithm Adar Dembo 3350 Thomas Drive Palo Alto, California

Evolving Musical Scores Using the Genetic Algorithm Adar Dembo 3350 Thomas Drive Palo Alto, California 1 Evolving Musical Scores Using the Genetic Algorithm Adar Dembo 3350 Thomas Drive Palo Alto, California 94303 adar@stanford.edu (650) 494-3757 Abstract: This paper describes a method for applying the

More information

Music Composition with Interactive Evolutionary Computation

Music Composition with Interactive Evolutionary Computation Music Composition with Interactive Evolutionary Computation Nao Tokui. Department of Information and Communication Engineering, Graduate School of Engineering, The University of Tokyo, Tokyo, Japan. e-mail:

More information

A QUANTITATIVE STUDY OF CATALOG USE

A QUANTITATIVE STUDY OF CATALOG USE Ben-Ami Lipetz Head, Research Department Yale University Library New Haven, Connecticut A QUANTITATIVE STUDY OF CATALOG USE Among people who are concerned with the management of libraries, it is now almost

More information

LFSR stream cipher RC4. Stream cipher. Stream Cipher

LFSR stream cipher RC4. Stream cipher. Stream Cipher Lecturers: Mark D. Ryan and David Galindo. Cryptography 2016. Slide: 89 Stream Cipher Suppose you want to encrypt a stream of data, such as: the data from a keyboard the data from a sensor Block ciphers

More information

Using an Evolutionary Algorithm to Generate Four-Part 18th Century Harmony

Using an Evolutionary Algorithm to Generate Four-Part 18th Century Harmony Using an Evolutionary Algorithm to Generate Four-Part 18th Century Harmony TAMARA A. MADDOX Department of Computer Science George Mason University Fairfax, Virginia USA JOHN E. OTTEN Veridian/MRJ Technology

More information

Cryptanalysis of LILI-128

Cryptanalysis of LILI-128 Cryptanalysis of LILI-128 Steve Babbage Vodafone Ltd, Newbury, UK 22 nd January 2001 Abstract: LILI-128 is a stream cipher that was submitted to NESSIE. Strangely, the designers do not really seem to have

More information

COMP Test on Psychology 320 Check on Mastery of Prerequisites

COMP Test on Psychology 320 Check on Mastery of Prerequisites COMP Test on Psychology 320 Check on Mastery of Prerequisites This test is designed to provide you and your instructor with information on your mastery of the basic content of Psychology 320. The results

More information

VIDEO intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE. AUTHOR: Arturo Ribagorda Garnacho

VIDEO intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE. AUTHOR: Arturo Ribagorda Garnacho VIDEO intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE AUTHOR: Arturo Ribagorda Garnacho Carlos III University of Madrid, Spain Hello and welcome to Intypedia. Today we are

More information

University of Toronto

University of Toronto Decrypting Classical Cipher Text Using Markov Chain Monte Carlo by Jian Chen Department of Statistics University of Toronto and Jeffrey S. Rosenthal Department of Statistics University of Toronto Technical

More information

A Genetic Algorithm for the Generation of Jazz Melodies

A Genetic Algorithm for the Generation of Jazz Melodies A Genetic Algorithm for the Generation of Jazz Melodies George Papadopoulos and Geraint Wiggins Department of Artificial Intelligence University of Edinburgh 80 South Bridge, Edinburgh EH1 1HN, Scotland

More information

1 Introduction 2. 3 Zygalski Sheets Using Zygalski Sheets Programmatic Replication Weaknesses/Problems 7

1 Introduction 2. 3 Zygalski Sheets Using Zygalski Sheets Programmatic Replication Weaknesses/Problems 7 Breaking Enigma Samantha Briasco-Stewart, Kathryn Hendrickson, and Jeremy Wright 1 Introduction 2 2 The Enigma Machine 2 2.1 Encryption and Decryption Process 3 2.2 Enigma Weaknesses 4 2.2.1 Encrypting

More information

PART FIVE. Transposition Systems TYPES OF TRANSPOSITION SYSTEMS

PART FIVE. Transposition Systems TYPES OF TRANSPOSITION SYSTEMS PART FIVE Transposition Systems TYPES OF TRANSPOSITION SYSTEMS CHAPTER 11 11-1. Nature of Transposition Transposition systems are fundamentally different from substitution systems. In substitution systems,

More information

Testing of Cryptographic Hardware

Testing of Cryptographic Hardware Testing of Cryptographic Hardware Presented by: Debdeep Mukhopadhyay Dept of Computer Science and Engineering, Indian Institute of Technology Madras Motivation Behind the Work VLSI of Cryptosystems have

More information

IMPLEMENTATION OF X-FACTOR CIRCUITRY IN DECOMPRESSOR ARCHITECTURE

IMPLEMENTATION OF X-FACTOR CIRCUITRY IN DECOMPRESSOR ARCHITECTURE IMPLEMENTATION OF X-FACTOR CIRCUITRY IN DECOMPRESSOR ARCHITECTURE SATHISHKUMAR.K #1, SARAVANAN.S #2, VIJAYSAI. R #3 School of Computing, M.Tech VLSI design, SASTRA University Thanjavur, Tamil Nadu, 613401,

More information

Sampling Plans. Sampling Plan - Variable Physical Unit Sample. Sampling Application. Sampling Approach. Universe and Frame Information

Sampling Plans. Sampling Plan - Variable Physical Unit Sample. Sampling Application. Sampling Approach. Universe and Frame Information Sampling Plan - Variable Physical Unit Sample Sampling Application AUDIT TYPE: REVIEW AREA: SAMPLING OBJECTIVE: Sampling Approach Type of Sampling: Why Used? Check All That Apply: Confidence Level: Desired

More information

Koester Performance Research Koester Performance Research Heidi Koester, Ph.D. Rich Simpson, Ph.D., ATP

Koester Performance Research Koester Performance Research Heidi Koester, Ph.D. Rich Simpson, Ph.D., ATP Scanning Wizard software for optimizing configuration of switch scanning systems Heidi Koester, Ph.D. hhk@kpronline.com, Ann Arbor, MI www.kpronline.com Rich Simpson, Ph.D., ATP rsimps04@nyit.edu New York

More information

Instrument Recognition in Polyphonic Mixtures Using Spectral Envelopes

Instrument Recognition in Polyphonic Mixtures Using Spectral Envelopes Instrument Recognition in Polyphonic Mixtures Using Spectral Envelopes hello Jay Biernat Third author University of Rochester University of Rochester Affiliation3 words jbiernat@ur.rochester.edu author3@ismir.edu

More information

Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page. History of Computing. Today s Topics. History of Computing Cipher Systems

Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page. History of Computing. Today s Topics. History of Computing Cipher Systems Lecture 8: Cracking the Codes based on Tony Sale s Codes & Ciphers Web Page Today s Topics Cipher Systems Substitution Ciphers Cracking Caesar s Cipher Polyalphabetic Substitution The Enigma Machine Rotors,

More information

The Swiss cipher machine NeMa

The Swiss cipher machine NeMa Faculty of Science, Technology and Communication The Swiss cipher machine NeMa Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Master in Information and Computer Sciences

More information

Nomenclators. Nomenclator Example. Alberti s Cipher Disk. Early code/cipher combination, popular form 1400s-1800s. Philip of Spain (1589, see Kahn):

Nomenclators. Nomenclator Example. Alberti s Cipher Disk. Early code/cipher combination, popular form 1400s-1800s. Philip of Spain (1589, see Kahn): Nomenclators Early code/cipher combination, popular form 1400s-1800s. Philip of Spain (1589, see Kahn): LO = Spain POM = King of Spain 64 = confederation overlined two-digit groups = null + substitution

More information

Lecture 3: Nondeterministic Computation

Lecture 3: Nondeterministic Computation IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Basic Course on Computational Complexity Lecture 3: Nondeterministic Computation David Mix Barrington and Alexis Maciel July 19, 2000

More information

Real-time QC in HCHP seismic acquisition Ning Hongxiao, Wei Guowei and Wang Qiucheng, BGP, CNPC

Real-time QC in HCHP seismic acquisition Ning Hongxiao, Wei Guowei and Wang Qiucheng, BGP, CNPC Chengdu China Ning Hongxiao, Wei Guowei and Wang Qiucheng, BGP, CNPC Summary High channel count and high productivity bring huge challenges to the QC activities in the high-density and high-productivity

More information

Weeding book collections in the age of the Internet

Weeding book collections in the age of the Internet Weeding book collections in the age of the Internet The author is Professor at Kent Library, Southeast Missouri State University, Cape Girardeau, Missouri, USA. Keywords Academic libraries, Collection

More information

Data Mining. Dr. Raed Ibraheem Hamed. University of Human Development, College of Science and Technology Department of CS

Data Mining. Dr. Raed Ibraheem Hamed. University of Human Development, College of Science and Technology Department of CS Data Mining Dr. Raed Ibraheem Hamed University of Human Development, College of Science and Technology Department of CS 2016 2017 Road map Common Distance measures The Euclidean Distance between 2 variables

More information

Liam Ranshaw. Expanded Cinema Final Project: Puzzle Room

Liam Ranshaw. Expanded Cinema Final Project: Puzzle Room Expanded Cinema Final Project: Puzzle Room My original vision of the final project for this class was a room, or environment, in which a viewer would feel immersed within the cinematic elements of the

More information

Optimization of Multi-Channel BCH Error Decoding for Common Cases. Russell Dill Master's Thesis Defense April 20, 2015

Optimization of Multi-Channel BCH Error Decoding for Common Cases. Russell Dill Master's Thesis Defense April 20, 2015 Optimization of Multi-Channel BCH Error Decoding for Common Cases Russell Dill Master's Thesis Defense April 20, 2015 Bose-Chaudhuri-Hocquenghem (BCH) BCH is an Error Correcting Code (ECC) and is used

More information

LECTURE NOTES ON Classical Cryptographic Techniques ( Substitution Ciphers System)

LECTURE NOTES ON Classical Cryptographic Techniques ( Substitution Ciphers System) Department of Software The University of Babylon LECTURE NOTES ON Classical Cryptographic Techniques ( Substitution Ciphers System) By College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq

More information

Improving Performance in Neural Networks Using a Boosting Algorithm

Improving Performance in Neural Networks Using a Boosting Algorithm - Improving Performance in Neural Networks Using a Boosting Algorithm Harris Drucker AT&T Bell Laboratories Holmdel, NJ 07733 Robert Schapire AT&T Bell Laboratories Murray Hill, NJ 07974 Patrice Simard

More information

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver. Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl www.crypto-textbook.com Chapter 2 Stream Ciphers ver. October 29, 2009 These slides were prepared by

More information

Example: compressing black and white images 2 Say we are trying to compress an image of black and white pixels: CSC310 Information Theory.

Example: compressing black and white images 2 Say we are trying to compress an image of black and white pixels: CSC310 Information Theory. CSC310 Information Theory Lecture 1: Basics of Information Theory September 11, 2006 Sam Roweis Example: compressing black and white images 2 Say we are trying to compress an image of black and white pixels:

More information

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver. Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl www.crypto-textbook.com Chapter 2 Stream Ciphers ver. October 29, 2009 These slides were prepared by

More information

THE INTERACTION BETWEEN MELODIC PITCH CONTENT AND RHYTHMIC PERCEPTION. Gideon Broshy, Leah Latterner and Kevin Sherwin

THE INTERACTION BETWEEN MELODIC PITCH CONTENT AND RHYTHMIC PERCEPTION. Gideon Broshy, Leah Latterner and Kevin Sherwin THE INTERACTION BETWEEN MELODIC PITCH CONTENT AND RHYTHMIC PERCEPTION. BACKGROUND AND AIMS [Leah Latterner]. Introduction Gideon Broshy, Leah Latterner and Kevin Sherwin Yale University, Cognition of Musical

More information

CSc 466/566. Computer Security. 4 : Cryptography Introduction

CSc 466/566. Computer Security. 4 : Cryptography Introduction 1/51 CSc 466/566 Computer Security 4 : Cryptography Introduction Version: 2012/02/06 16:06:05 Department of Computer Science University of Arizona collberg@gmail.com Copyright c 2012 Christian Collberg

More information

2. Problem formulation

2. Problem formulation Artificial Neural Networks in the Automatic License Plate Recognition. Ascencio López José Ignacio, Ramírez Martínez José María Facultad de Ciencias Universidad Autónoma de Baja California Km. 103 Carretera

More information

6.UAP Project. FunPlayer: A Real-Time Speed-Adjusting Music Accompaniment System. Daryl Neubieser. May 12, 2016

6.UAP Project. FunPlayer: A Real-Time Speed-Adjusting Music Accompaniment System. Daryl Neubieser. May 12, 2016 6.UAP Project FunPlayer: A Real-Time Speed-Adjusting Music Accompaniment System Daryl Neubieser May 12, 2016 Abstract: This paper describes my implementation of a variable-speed accompaniment system that

More information

Timing Error Detection: An Adaptive Scheme To Combat Variability EE241 Final Report Nathan Narevsky and Richard Ott {nnarevsky,

Timing Error Detection: An Adaptive Scheme To Combat Variability EE241 Final Report Nathan Narevsky and Richard Ott {nnarevsky, Timing Error Detection: An Adaptive Scheme To Combat Variability EE241 Final Report Nathan Narevsky and Richard Ott {nnarevsky, tomott}@berkeley.edu Abstract With the reduction of feature sizes, more sources

More information

Precise Digital Integration of Fast Analogue Signals using a 12-bit Oscilloscope

Precise Digital Integration of Fast Analogue Signals using a 12-bit Oscilloscope EUROPEAN ORGANIZATION FOR NUCLEAR RESEARCH CERN BEAMS DEPARTMENT CERN-BE-2014-002 BI Precise Digital Integration of Fast Analogue Signals using a 12-bit Oscilloscope M. Gasior; M. Krupa CERN Geneva/CH

More information

Discussing some basic critique on Journal Impact Factors: revision of earlier comments

Discussing some basic critique on Journal Impact Factors: revision of earlier comments Scientometrics (2012) 92:443 455 DOI 107/s11192-012-0677-x Discussing some basic critique on Journal Impact Factors: revision of earlier comments Thed van Leeuwen Received: 1 February 2012 / Published

More information

New Address Shift Linear Feedback Shift Register Generator

New Address Shift Linear Feedback Shift Register Generator New Address Shift Linear Feedback Shift Register Generator Kholood J. Moulood Department of Mathematical, Tikrit University, College of Education for Women, Salahdin. E-mail: khmsc2006@yahoo.com. Abstract

More information

Characterization and improvement of unpatterned wafer defect review on SEMs

Characterization and improvement of unpatterned wafer defect review on SEMs Characterization and improvement of unpatterned wafer defect review on SEMs Alan S. Parkes *, Zane Marek ** JEOL USA, Inc. 11 Dearborn Road, Peabody, MA 01960 ABSTRACT Defect Scatter Analysis (DSA) provides

More information

Sequences and Cryptography

Sequences and Cryptography Sequences and Cryptography Workshop on Shift Register Sequences Honoring Dr. Solomon W. Golomb Recipient of the 2016 Benjamin Franklin Medal in Electrical Engineering Guang Gong Department of Electrical

More information

From Theory to Practice: Private Circuit and Its Ambush

From Theory to Practice: Private Circuit and Its Ambush Indian Institute of Technology Kharagpur Telecom ParisTech From Theory to Practice: Private Circuit and Its Ambush Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger and Debdeep Mukhopadhyay

More information

1. Introduction. Abstract. 1.1 Logic Criteria

1. Introduction. Abstract. 1.1 Logic Criteria An Evaluation of the Minimal-MUMCUT Logic Criterion and Prime Path Coverage Garrett Kaminski, Upsorn Praphamontripong, Paul Ammann, Jeff Offutt Computer Science Department, George Mason University, Fairfax,

More information

DAT335 Music Perception and Cognition Cogswell Polytechnical College Spring Week 6 Class Notes

DAT335 Music Perception and Cognition Cogswell Polytechnical College Spring Week 6 Class Notes DAT335 Music Perception and Cognition Cogswell Polytechnical College Spring 2009 Week 6 Class Notes Pitch Perception Introduction Pitch may be described as that attribute of auditory sensation in terms

More information

Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, The Enigma Machine

Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, The Enigma Machine Eric Roberts and Jerry Cain Handout #36 CS 106J May 15, 2017 The Enigma Machine In World War II, a team of British mathematicians working at a secret facility called Bletchley Park was able to break the

More information

Jazz Melody Generation and Recognition

Jazz Melody Generation and Recognition Jazz Melody Generation and Recognition Joseph Victor December 14, 2012 Introduction In this project, we attempt to use machine learning methods to study jazz solos. The reason we study jazz in particular

More information

Music Recommendation from Song Sets

Music Recommendation from Song Sets Music Recommendation from Song Sets Beth Logan Cambridge Research Laboratory HP Laboratories Cambridge HPL-2004-148 August 30, 2004* E-mail: Beth.Logan@hp.com music analysis, information retrieval, multimedia

More information

Automatically Creating Biomedical Bibliographic Records from Printed Volumes of Old Indexes

Automatically Creating Biomedical Bibliographic Records from Printed Volumes of Old Indexes Automatically Creating Biomedical Bibliographic Records from Printed Volumes of Old Indexes Daniel X. Le and George R. Thoma National Library of Medicine Bethesda, MD 20894 ABSTRACT To provide online access

More information

Combining Pay-Per-View and Video-on-Demand Services

Combining Pay-Per-View and Video-on-Demand Services Combining Pay-Per-View and Video-on-Demand Services Jehan-François Pâris Department of Computer Science University of Houston Houston, TX 77204-3475 paris@cs.uh.edu Steven W. Carter Darrell D. E. Long

More information

Music Composition with RNN

Music Composition with RNN Music Composition with RNN Jason Wang Department of Statistics Stanford University zwang01@stanford.edu Abstract Music composition is an interesting problem that tests the creativity capacities of artificial

More information

Automatic Classification of Reference Service Records

Automatic Classification of Reference Service Records Available online at www.sciencedirect.com Procedia - Social and Behavioral Sciences 00 (2013) 000 000 www.elsevier.com/locate/procedia 3 rd International Conference on Integrated Information (IC-ININFO)

More information

Retiming Sequential Circuits for Low Power

Retiming Sequential Circuits for Low Power Retiming Sequential Circuits for Low Power José Monteiro, Srinivas Devadas Department of EECS MIT, Cambridge, MA Abhijit Ghosh Mitsubishi Electric Research Laboratories Sunnyvale, CA Abstract Switching

More information

Using the MAX3656 Laser Driver to Transmit Serial Digital Video with Pathological Patterns

Using the MAX3656 Laser Driver to Transmit Serial Digital Video with Pathological Patterns Design Note: HFDN-33.0 Rev 0, 8/04 Using the MAX3656 Laser Driver to Transmit Serial Digital Video with Pathological Patterns MAXIM High-Frequency/Fiber Communications Group AVAILABLE 6hfdn33.doc Using

More information

Composer Identification of Digital Audio Modeling Content Specific Features Through Markov Models

Composer Identification of Digital Audio Modeling Content Specific Features Through Markov Models Composer Identification of Digital Audio Modeling Content Specific Features Through Markov Models Aric Bartle (abartle@stanford.edu) December 14, 2012 1 Background The field of composer recognition has

More information

Multiple Image Secret Sharing based on Linear System

Multiple Image Secret Sharing based on Linear System Indian Journal of Science and Technology, Vol 10(33), 10.17485/ijst/2017/v10i33/113085, September 2017 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Multiple Image Secret Sharing based on Linear System

More information

Music/Lyrics Composition System Considering User s Image and Music Genre

Music/Lyrics Composition System Considering User s Image and Music Genre Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009 Music/Lyrics Composition System Considering User s Image and Music Genre Chisa

More information

Building a Better Bach with Markov Chains

Building a Better Bach with Markov Chains Building a Better Bach with Markov Chains CS701 Implementation Project, Timothy Crocker December 18, 2015 1 Abstract For my implementation project, I explored the field of algorithmic music composition

More information

Institute of Southern Punjab, Multan

Institute of Southern Punjab, Multan Institute of Southern Punjab, Multan Network Security Substitution Techniques Lecture#4 Mazhar Hussain E-mail: mazhar.hussain@isp.edu.pk Lecture 4: Substitution Techniques Polybius Cipher Playfair Cipher

More information

Achieving Faster Time to Tapeout with In-Design, Signoff-Quality Metal Fill

Achieving Faster Time to Tapeout with In-Design, Signoff-Quality Metal Fill White Paper Achieving Faster Time to Tapeout with In-Design, Signoff-Quality Metal Fill May 2009 Author David Pemberton- Smith Implementation Group, Synopsys, Inc. Executive Summary Many semiconductor

More information

Design of Fault Coverage Test Pattern Generator Using LFSR

Design of Fault Coverage Test Pattern Generator Using LFSR Design of Fault Coverage Test Pattern Generator Using LFSR B.Saritha M.Tech Student, Department of ECE, Dhruva Institue of Engineering & Technology. Abstract: A new fault coverage test pattern generator

More information